EnsurepassQUESTION 181 John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: Which of the following tools is John using to crack the wireless encryption keys? A. Cain B. PsPasswd C. Kismet D. AirSnort Correct Answer: D Explanation: AirSnort is a Linux-based WLAN WEP cracking tool that Read more [...]

EnsurepassQUESTION 211 Which of the following is an electronic device that helps in forwarding data packets along networks? A. Router B. Hub C. Repeater D. Gateway Correct Answer: A QUESTION 212 Which of the following represents a network that connects two or more LANs in the same geographic area? A. PAN B. WAN C. MAN D. SAN Correct Answer: C QUESTION 213 The IP addresses reserved for experimental purposes belong Read more [...]

EnsurepassQUESTION 191 In an Ethernet peer-to-peer network, which of the following cables is used to connect two computers, using RJ-45 connectors and Category-5 UTP cable? A. Serial B. Loopback C. Crossover D. Parallel Correct Answer: C Explanation: In an Ethernet peer-to-peer network, a crossover cable is used to connect two computers, using RJ-45 connectors and Category-5 UTP cable. Answer options D and A are incorrect. Parallel and serial cables do not use RJ-45 connectors Read more [...]

EnsurepassQUESTION 171 Which of the following are the valid steps for securing routers? Each correct answer represents a complete solution. Choose all that apply. A. Use a password that is easy to remember for a router's administrative console. B. Use a complex password for a router's administrative console. C. Configure access list entries to prevent unauthorized connections and traffic routing. D. Keep routers updated with the latest security patches. Correct Answer: Read more [...]

EnsurepassQUESTION 161 Which of the following IP class addresses are not allotted to hosts? Each correct answer represents a complete solution. Choose all that apply. A. Class C B. Class D C. Class A D. Class B E. Class E Correct Answer: BE Explanation: Class addresses D and E are not allotted to hosts. Class D addresses are reserved for multicasting, and their address range can extend from 224 to 239. Class E addresses are reserved for experimental purposes. Their Read more [...]

EnsurepassQUESTION 151 Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. Choose two. A. Adding a second power supply unit B. Performing regular backup of the server C. Adding one more same sized disk as mirror on the server D. Implementing cluster servers facility E. Encrypting confidential data stored on the server Correct Answer: BE Explanation: Encrypting confidential data stored on the server Read more [...]

EnsurepassQUESTION 71 Fill in the blank with the appropriate term. The ___________protocol is a feature of packet-based data transmission protocols. It is used to keep a record of the frame sequences sent and their respective acknowledgements received by both the users. Correct Answer: Sliding Window Explanation: The Sliding Window protocol is a feature of packet-based data transmission protocols. It is used in the data link layer (OSI model) as well as in TCP (transport layer of the OSI model). Read more [...]

EnsurepassQUESTION 91 Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose? A. False accusation B. Attempts to gather information about the victim C. Encouraging others to harass the victim D. False victimization Correct Answer: A Explanation: In false accusations, many cyberstalkers try to damage the reputation of their victim and Read more [...]